Zum Inhalt springen
Prototyp pruefen

System Overview

This specification defines the Superheld platform architecture at component level: what each component does, where it runs, what trust boundaries exist, and how data flows between them.

Audience: Engineers, security auditors, integration architects.


In-ScopeOut-of-Scope
Component responsibilities and interfacesImplementation code or internal APIs
Trust boundaries and data classificationNetwork firewall / IDS / EDR functionality
Deployment topologyPhysical device security
Failure modes and mitigationsSupply-chain / OS-level attacks

ComponentResponsibilityRuntime
Device Guardian AgentLightweight system service. Real-time monitoring of communication channels (email, messenger, browser, file downloads). Content extraction, prefiltering, threat notifications.Local device process
Local Protection EngineCompact ML models for on-device inference. NLP for social engineering, image classification, URL analysis, behavioral analysis.Local device process
Detection Pipeline6-stage signal processing: Signal Collection → Local Detection → Cloud Enrichment → Policy Decision → Event Generation → Alert Exposure.Local device process (Stages 1–2, 4–6), Cloud (Stage 3 optional)
Policy EngineEvaluates threat candidates against configured policies. Deterministic, auditable, fail-closed.Local device process
Event StoreAppend-only, cryptographically chained log of all detection events. AES-256 encrypted.Local device storage
ComponentResponsibilityRuntime
Threat DatabaseDistributed database of anonymized threat signatures and IoCs. Continuously updated from anonymized agent reports.Cloud (EU — Frankfurt)
Model Update ServiceML pipeline for model training. Distributes signed model packages to device agents.Cloud
AI Analysis ModuleGPU cluster for complex analysis (deepfake detection, advanced NLP). Processes only anonymized feature vectors. Never receives plaintext.Cloud
Cloud Enrichment APIStateless lookup service. Receives SHA-256 hashes and anonymized feature vectors. Returns risk assessments and campaign attribution.Cloud


  • Contains: User data, Local Protection Engine, Detection Pipeline, Policy Engine, Event Store
  • Characteristic: All personalized data exists only here. Cloud has no access to decrypted contents.
  • Encryption at rest: AES-256, keys in secure enclave (iOS) or keystore (Android)
  • Protection: Certificate pinning prevents MITM attacks
  • Version: TLS 1.3 enforced, downgrade prohibited
  • Perfect Forward Secrecy: Yes
  • Replay protection: Yes
  • Receives: (1) SHA-256 hashes for threat intelligence lookups, (2) Anonymized feature vectors for complex case escalation
  • Never receives: Plaintext content, phone numbers, user data, filenames
  • Stateless: Cloud requests contain no device ID or user ID; lookups are not linkable across requests

Documented product target: stateless cloud enrichment without stable identifiers. The current workspace does not yet implement the full enrichment path described here.

  • Exposure: Filtered events only (no plaintext)
  • Channels: REST API (cursor-based), Webhooks (HMAC-SHA256 signed), Push notifications (OS-level)

Data TypeStays on DeviceLeaves DeviceForm When Leaving
Message/email contentYesNo
Audio/call contentYes (RAM only)No
Files/attachmentsYesNo
Phone numbersYesYes (hashes only)SHA-256 hash
App signaturesYesYes (hashes only)SHA-256 hash
Complex analysis casesYes (original)Yes (transformed)Anonymized feature vectors
Detection eventsYes (90 days)Yes (filtered)Redacted event objects
Device identifiersYesYes (encrypted)License management only
Aggregated telemetryYesYes (opt-in)Anonymized statistics

Core principle: Audio and message plaintext NEVER leave the device. Cloud receives ONLY (1) SHA-256 hashes and (2) anonymized feature vectors.


FailureImpactMitigation
Cloud unreachableNo Cloud Enrichment (Stage 3 skipped)Local detection continues with reduced accuracy for novel threats. Offline buffering for events.
Model update failureAgent runs with last known-good modelSigned packages with rollback protection. Agent rejects older model versions.
Policy file corruptionPolicy unparseableFail-closed: unparseable policy defaults to Block. Checksum verification at load.
Event Store fullCannot persist new eventsRing buffer with configurable retention. Oldest events overwritten.
Permission denied (OS)Signal source unavailableGraceful degradation per signal. User notified of reduced protection scope.

ComponentLocationScalingRedundancy
Device AgentPer-device1 instance per deviceN/A (device-local)
Cloud Enrichment APIEU (Frankfurt)HorizontalMulti-AZ
Threat DatabaseEU (Frankfurt)DistributedReplicated
Model Update ServiceEU (Frankfurt)On-demandRedundant pipeline
AI Analysis ModuleEU (Frankfurt)GPU clusterLoad-balanced

Documented product target: EU-hosted active-active deployment. The current workspace repository does not by itself confirm the exact hosting topology or SLOs listed here.